Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3526
Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and previous versions allows remote authenticated users to execute arbitrary code via a long FETCH command.
Ipswitch Ipswitch Collaboration Suite 2006.02 Premium
Ipswitch Ipswitch Collaboration Suite 2006.02 Standard
NA
CVE-2004-0798
Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold prior to 8.03 Hotfix 1 allows remote malicious users to execute arbitrary code via a long instancename parameter.
Ipswitch Whatsup Gold 8.0
Ipswitch Whatsup Gold 8.03
Ipswitch Whatsup Gold 7.03
Ipswitch Whatsup Gold 8.01
Ipswitch Whatsup Gold 7.04
Ipswitch Whatsup Gold 7.0
2 EDB exploits
NA
CVE-2004-0799
The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote malicious users to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm".
Ipswitch Whatsup Gold 8.0
Ipswitch Whatsup Gold 8.03 Hotfix 1
Ipswitch Whatsup Gold 8.03
Ipswitch Whatsup Gold 7.03
Ipswitch Whatsup Gold 8.01
Ipswitch Whatsup Gold 7.04
Ipswitch Whatsup Gold 7.0
NA
CVE-2007-3925
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 prior to 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
Ipswitch Imail Server
Ipswitch Ipswitch Collaboration Suite
2 EDB exploits
NA
CVE-2007-3927
Multiple buffer overflows in Ipswitch IMail Server 2006 prior to 2006.21 (1) allow remote malicious users to execute arbitrary code via unspecified vectors in Imailsec and (2) allow malicious users to have an unknown impact via an unspecified vector related to "subscribe.&qu...
Ipswitch Imail Server
Ipswitch Ipswitch Collaboration Suite
1 EDB exploit
NA
CVE-2007-3959
The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging prior to 2.07 in Ipswitch Collaboration Suite (ICS) allows remote malicious users to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a de...
Ipswitch Ipswitch Collaboration Suite
Ipswitch Imserver 2.0.5.30
NA
CVE-2005-1254
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument.
Ipswitch Imail
Ipswitch Imail 8.12
Ipswitch Imail 8.13
NA
CVE-2000-0056
IMail IMONITOR status.cgi CGI script allows remote malicious users to cause a denial of service with many calls to status.cgi.
Ipswitch Imail 5.0.8
Ipswitch Imail 6.1
Ipswitch Imail 6.0
1 EDB exploit
NA
CVE-2001-1280
POP3 Server for Ipswitch IMail 7.04 and previous versions generates different responses to valid and invalid user names, which allows remote malicious users to determine users on the system.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
NA
CVE-2001-1285
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and previous versions allows remote malicious users to access the mailboxes of other users via a .. (dot dot) in the mbx parameter.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »